![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
|
![]() ![]() You may like...
Hormonal Pathology of the Uterus
Liane Deligdisch-Schor, Angelica Mares Miceli
Hardcover
R2,876
Discovery Miles 28 760
The Book Of Joy - Lasting Happiness In A…
Dalai Lama, Desmond Tutu
Hardcover
![]() R409 Discovery Miles 4 090
Lung Cancer, An Issue of…
Roy S. Herbst, Daniel Morgensztern
Hardcover
R2,256
Discovery Miles 22 560
NMR Metabolomics in Cancer Research
Miroslava Cuperlovic-Culf
Hardcover
R5,036
Discovery Miles 50 360
|